Skip to main content

About your Search

20130126
20130203
Search Results 0 to 1 of about 2
working at the nsc on detail and nato headquarters, the middle east and the pentagon. pentagon. he was adviser to four presidents, president obama asked them to lead his afghanistan-pakistan paula's review in early 2009, and do that for a couple of months before apple first returning to brookings. bruce has written two books in the time has been a, a third is about to come out and i will mention that in the second of the first two were about al qaeda and then about the is pakistan relationship. so the search for al qaeda, the deadly embrace, his new book coming out next month is avoiding armageddon. it's a story by the u.s.-india pakistan relationship and crisis management over the last half-century or so. general stan mcchrystal is a 1976 graduate of west point, spent 34 years in u.s. army, retiring as a four-star general the summer 2010. he has been command in afghanistan. use the correct of the joint staff but perhaps the military circles most of all as i mentioned this five year period at joint special operations command makes a memorable and historic. general casey at his reti
've seen two budget-related announcements coming out of the pentagon. one, i was looking up just now because i was trying to remember the numbers, and that is that the pentagon is beefing up its cybersecurity force, taking it from 900 to 4,000 and putting a few billion dollars into it. the other one that is apparently being beefed up in these times of budgetary constraints are the special forces. tom, would you just talk about that generally and then, fred, if you would talk about that not just in afghanistan, but in the broader battle and the nature of it, and then we'll come over to publish shah and the non-- membership shah and the nonexistent challenge that faces us in asia. [laughter] >> i'll try to be brief, dani. look, these new capabilities, you know, cyber operations or whatever you want to call them are certainly necessary and needed, and our ability to exploit, you know, the electromagnetic spectrum configured as the internet is, you know, pretty critical. but it's not qualitatively different from other forms of intelligence gathering or, you know, attempts to either by pr
Search Results 0 to 1 of about 2